1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
4 years ago
7

Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are

now subject to authorized access. Despite the fact the CISO announced that there were a few prior warning signs that the system was at risk, no actions were taken to locate the system vulnerability. Because government agencies must comply with NIST standards, it is evident that the breach occurred as a result of insufficient management or governance. True False
Computers and Technology
2 answers:
Evgesh-ka [11]4 years ago
7 0

Answer:

Answer is TRUE.

Refer below.

Explanation:

Because government agencies must comply with NIST standards, it is evident that the breach occurred as a result of insufficient management or governance is TRUE.

KatRina [158]4 years ago
3 0

Answer:

True

Explanation:

When any government agency experiences a data breach subjecting personal records to authorized access, no actions would be taken to locate the system vulnerability even if it was announced by the chief information security officer (CISO) because government agencies must comply with the National Institute of Standards and Technology (NIST) standards.

You might be interested in
window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
fredd [130]

Answer:

The window operating system is popularly known as a graphical user interface(GUI)

Explanation:

older operating systems were command line based but window uses a gui

5 0
3 years ago
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information
Law Incorporation [45]
When someone online attempts to befriend you for the soul purpose of stealing confidential or sensitive information it is called social engineering
5 0
4 years ago
Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
Sphinxa [80]
Hub , switch port , transmission media , hope I helped
4 0
3 years ago
Read 2 more answers
This question involves the creation of user names for an online system. A user name is created based on a user’s first and last
Evgen [1.6K]

Answer:

See explaination

Explanation:

import java.util.*;

class UserName{

ArrayList<String> possibleNames;

UserName(String firstName, String lastName){

if(this.isValidName(firstName) && this.isValidName(lastName)){

possibleNames = new ArrayList<String>();

for(int i=1;i<firstName.length()+1;i++){

possibleNames.add(lastName+firstName.substring(0,i));

}

}else{

System.out.println("firstName and lastName must contain letters only.");

}

}

public boolean isUsed(String name, String[] arr){

for(int i=0;i<arr.length;i++){

if(name.equals(arr[i]))

return true;

}

return false;

}

public void setAvailableUserNames(String[] usedNames){

String[] names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

for(int i=0;i<usedNames.length;i++){

if(isUsed(usedNames[i],names)){

int index = this.possibleNames.indexOf(usedNames[i]);

this.possibleNames.remove(index);

names = new String[this.possibleNames.size()];

names = this.possibleNames.toArray(names);

}

}

}

public boolean isValidName(String str){

if(str.length()==0) return false;

for(int i=0;i<str.length();i++){

if(str.charAt(i)<'a'||str.charAt(i)>'z' && (str.charAt(i)<'A' || str.charAt(i)>'Z'))

return false;

}

return true;

}

public static void main(String[] args) {

UserName person1 = new UserName("john","smith");

System.out.println(person1.possibleNames);

String[] used = {"harta","hartm","harty"};

UserName person2 = new UserName("mary","hart");

System.out.println("possibleNames before removing: "+person2.possibleNames);

person2.setAvailableUserNames(used);

System.out.println("possibleNames after removing: "+person2.possibleNames);

}

}

8 0
3 years ago
What is the answer to this?
mixer [17]

Honestly, that sounds like Space Invaders to me if that's an answer choice.

8 0
4 years ago
Other questions:
  • g Write a program that prompts the user to enter two integers. The program outputs how many numbers are multiples of 3 and how m
    11·1 answer
  • All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
    12·1 answer
  • What is not a basic function of a computer?
    10·2 answers
  • On the Header &amp; Footer Tools Design tab, you can conveniently add a header, a footer, page numbers, and A. columns. B. times
    8·2 answers
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    7·1 answer
  • What is the most likely reason that a digital artist would use a program such as Autodesk Maya or Max to create 3-D images for a
    12·1 answer
  • According to the passage, what are the goals of the<br> program? Check all that apply.
    11·1 answer
  • Write pseudocode for a function that translates a telephone number with letters in it (such as 1-800-FLOWERS) into the actual ph
    11·1 answer
  • A Python keyword ______________.
    15·1 answer
  • Why header files are needed in every c program ?expalin​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!